Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of
This book constitutes the refereed proceedings of the 6th InternationalConference on Information Systems Security, ICISS 2010, held inGandhinagar, India, in December 2010.The 14 revised full papers pr